Read More

The chip design flaw has been outlined in two vulnerabilities codenamed Meltdown and Spectre.

The processor chip industry is reportedly top have been aware of issue for month, though details of were reported earlier this week before the manufacturers had fixes built and ready to release.

Meltdown, which largely affects Intel chips, is believed to be fixable with a software patch.

Researchers believe Spectre will be much harder to address, as it affects chips made for smartphones and tablets by Intel, AMD and Arm, and may not be readily fixable by software patching.

Apple has now released patches for 1OS 11 and macOS 10.13.2 to tackle the Meltdown flaw and said to date there was “no known exploits”.

The company said it is working on a release for its Safari web browser to defend against the Spectre vulnerability.

On its support page, Apple said: “Since exploiting many of these issues requires a malicious app to be loaded on your Mac or iOS device, we recommend downloading software only from trusted sources such as the App Store.”

The design flaw stems from CPU manufacturers competing to drive up the speed of processing.

Modern chips are designed to guess the next instruction, though if the command differs the processors guess leaves a trail of speculatively executed code in temporary cache files.

It is this vulnerability which experts claim can allow hackers to access private kernel memory responsible for memory, process and task management.

Read More

Glasgow-based data storage specialist iomart warned on Thursday such chipsets are widely used across its hardware and said Intel had yet to “fully disclosed what remedial action needs to be taken or the potential impact it could have”.

Intel stated on Thursday it has already issued updates for chips used in commercial and consumer applications manufactured in the last five years and said updates covering 90 of chips made in that period will be released by the end of this week.

However Intel has yet to outline a timetable for fixes for older processors.